SV-230270r627750_rule
V-230270
SRG-OS-000138-GPOS-00069
RHEL-08-010376
CAT III
10
Configure the operating system to prevent kernel profiling by unprivileged users.
Add or edit the following line in a system configuration file in the "/etc/sysctl.d/" directory:
kernel.perf_event_paranoid = 2
Load settings from all system configuration files with the following command:
$ sudo sysctl --system
Verify the operating system is configured to prevent kernel profiling by unprivileged users with the following commands:
Check the status of the kernel.perf_event_paranoid kernel parameter.
$ sudo sysctl kernel.perf_event_paranoid
kernel.perf_event_paranoid = 2
If "kernel.perf_event_paranoid" is not set to "2" or is missing, this is a finding.
Check that the configuration files are present to enable this kernel parameter.
$ sudo grep -r kernel.perf_event_paranoid /etc/sysctl.conf /etc/sysctl.d/*.conf
/etc/sysctl.d/99-sysctl.conf:kernel.perf_event_paranoid = 2
If "kernel.perf_event_paranoid" is not set to "2", is missing or commented out, this is a finding.
V-230270
False
RHEL-08-010376
Verify the operating system is configured to prevent kernel profiling by unprivileged users with the following commands:
Check the status of the kernel.perf_event_paranoid kernel parameter.
$ sudo sysctl kernel.perf_event_paranoid
kernel.perf_event_paranoid = 2
If "kernel.perf_event_paranoid" is not set to "2" or is missing, this is a finding.
Check that the configuration files are present to enable this kernel parameter.
$ sudo grep -r kernel.perf_event_paranoid /etc/sysctl.conf /etc/sysctl.d/*.conf
/etc/sysctl.d/99-sysctl.conf:kernel.perf_event_paranoid = 2
If "kernel.perf_event_paranoid" is not set to "2", is missing or commented out, this is a finding.
M
2921